{"title":"Modeling and controlling spatiotemporal malware propagation in mobile Internet of Things","authors":"Huiying Cao , Da-Tian Peng , Dengxiu Yu","doi":"10.1016/j.apm.2025.116042","DOIUrl":null,"url":null,"abstract":"<div><div>The mobility of devices in mobile Internet of Things (IoT) enables dynamic interactions, facilitating the spatiotemporal malware propagation. However, few studies have focused on accurately modeling and effectively controlling this form of malware propagation. To address this issue, we propose a theoretical framework that integrates patch-malware spreading dynamics with optimal patch allocation policy. First, we establish a novel temporal multilayer network comprising a central node, a patch dissemination layer, and a malware propagation layer. The hybrid patching process is implemented by the integration of the central node and the patch dissemination layer. In the malware propagation layer, the mobility of IoT devices is modeled as a diffusion process across multiple areas. Next, we design a dynamic spreading model to capture the evolution of malware propagation and analytically derive the invasion threshold. The threshold indicates that malware propagation is significantly influenced by both the patching process and the topological structure of mobile IoT. Furthermore, considering the central host's capacity and patch effectiveness, we develop an optimization algorithm to determine the optimal patch allocation policy under resource constraints. This algorithm significantly outperforms traditional centrality-based methods in malware mitigation. Finally, we analyze the impact of device mobility, the connectivity of the patch dissemination layer, the device distribution, the central node's capacity, and the patch effectiveness on malware propagation. Our study provides a theoretical foundation for predicting and controlling malware spreading in mobile IoT.</div></div>","PeriodicalId":50980,"journal":{"name":"Applied Mathematical Modelling","volume":"144 ","pages":"Article 116042"},"PeriodicalIF":4.4000,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Mathematical Modelling","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0307904X25001179","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
The mobility of devices in mobile Internet of Things (IoT) enables dynamic interactions, facilitating the spatiotemporal malware propagation. However, few studies have focused on accurately modeling and effectively controlling this form of malware propagation. To address this issue, we propose a theoretical framework that integrates patch-malware spreading dynamics with optimal patch allocation policy. First, we establish a novel temporal multilayer network comprising a central node, a patch dissemination layer, and a malware propagation layer. The hybrid patching process is implemented by the integration of the central node and the patch dissemination layer. In the malware propagation layer, the mobility of IoT devices is modeled as a diffusion process across multiple areas. Next, we design a dynamic spreading model to capture the evolution of malware propagation and analytically derive the invasion threshold. The threshold indicates that malware propagation is significantly influenced by both the patching process and the topological structure of mobile IoT. Furthermore, considering the central host's capacity and patch effectiveness, we develop an optimization algorithm to determine the optimal patch allocation policy under resource constraints. This algorithm significantly outperforms traditional centrality-based methods in malware mitigation. Finally, we analyze the impact of device mobility, the connectivity of the patch dissemination layer, the device distribution, the central node's capacity, and the patch effectiveness on malware propagation. Our study provides a theoretical foundation for predicting and controlling malware spreading in mobile IoT.
期刊介绍:
Applied Mathematical Modelling focuses on research related to the mathematical modelling of engineering and environmental processes, manufacturing, and industrial systems. A significant emerging area of research activity involves multiphysics processes, and contributions in this area are particularly encouraged.
This influential publication covers a wide spectrum of subjects including heat transfer, fluid mechanics, CFD, and transport phenomena; solid mechanics and mechanics of metals; electromagnets and MHD; reliability modelling and system optimization; finite volume, finite element, and boundary element procedures; modelling of inventory, industrial, manufacturing and logistics systems for viable decision making; civil engineering systems and structures; mineral and energy resources; relevant software engineering issues associated with CAD and CAE; and materials and metallurgical engineering.
Applied Mathematical Modelling is primarily interested in papers developing increased insights into real-world problems through novel mathematical modelling, novel applications or a combination of these. Papers employing existing numerical techniques must demonstrate sufficient novelty in the solution of practical problems. Papers on fuzzy logic in decision-making or purely financial mathematics are normally not considered. Research on fractional differential equations, bifurcation, and numerical methods needs to include practical examples. Population dynamics must solve realistic scenarios. Papers in the area of logistics and business modelling should demonstrate meaningful managerial insight. Submissions with no real-world application will not be considered.